![Information / Data management / Computing / Cryptography / Big data / Technology forecasting / Transaction processing / Differential Privacy / Data retention / Internet privacy / Geographic information system / Privacy Information / Data management / Computing / Cryptography / Big data / Technology forecasting / Transaction processing / Differential Privacy / Data retention / Internet privacy / Geographic information system / Privacy](https://www.pdfsearch.io/img/ac53f2f8ddd918b2dc7692601cd76c2a.jpg) Date: 2017-04-03 16:01:30Information Data management Computing Cryptography Big data Technology forecasting Transaction processing Differential Privacy Data retention Internet privacy Geographic information system Privacy | | Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization Mathias Lecuyer∗1 , Riley Spahn∗1 , Roxana Geambasu1 , Tzu-Kuo Huang†2 , and Siddhartha Sen3 1 Columbia University, 2 Uber Advanced TecAdd to Reading ListSource URL: www.ieee-security.orgDownload Document from Source Website File Size: 649,87 KBShare Document on Facebook
|